Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas Fuhr 0001
@article{DBLP:journals/joc/Chaigneau0GJR19, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1423--1447}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9297-9}, doi = {10.1007/S00145-018-9297-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGGJRS18, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and Jian Guo and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard and Ling Song}, title = {Key-Recovery Attacks on Full Kravatte}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {5--28}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.5-28}, doi = {10.13154/TOSC.V2018.I1.5-28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FuhrNR18, author = {Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Yann Rotella}, title = {State-Recovery Attacks on Modified Ketje Jr}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {29--56}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.29-56}, doi = {10.13154/TOSC.V2018.I1.29-56}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGJR17, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {156--174}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.156-174}, doi = {10.13154/TOSC.V2017.I1.156-174}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FuhrLS15, author = {Thomas Fuhr and Ga{\"{e}}tan Leurent and Valentin Suder}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Collision Attacks Against {CAESAR} Candidates - Forgery and Key-Recovery Against {AEZ} and Marble}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {510--532}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_21}, doi = {10.1007/978-3-662-48800-3\_21}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FuhrLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrLS15, author = {Thomas Fuhr and Ga{\"{e}}tan Leurent and Valentin Suder}, title = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery against {AEZ} and Marble}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2015}, url = {http://eprint.iacr.org/2015/1193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuhrM14, author = {Thomas Fuhr and Brice Minaud}, editor = {Carlos Cid and Christian Rechberger}, title = {Match Box Meet-in-the-Middle Attack Against {KATAN}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {61--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_4}, doi = {10.1007/978-3-662-46706-0\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FuhrM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Canteaut0GNR14, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and Mar{\'{\i}}a Naya{-}Plasencia and Jean{-}Ren{\'{e}} Reinhard}, editor = {Carlos Cid and Christian Rechberger}, title = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {591--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_30}, doi = {10.1007/978-3-662-46706-0\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFGNR14, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and Mar{\'{\i}}a Naya{-}Plasencia and Jean{-}Ren{\'{e}} Reinhard}, title = {Multiple Di fferential Cryptanalysis of Round-Reduced {PRINCE} (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2014}, url = {http://eprint.iacr.org/2014/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFGNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/FuhrJLT13, author = {Thomas Fuhr and {\'{E}}liane Jaulmes and Victor Lomn{\'{e}} and Adrian Thillard}, editor = {Wieland Fischer and J{\"{o}}rn{-}Marc Schmidt}, title = {Fault Attacks on {AES} with Faulty Ciphertexts Only}, booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013}, pages = {108--118}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FDTC.2013.18}, doi = {10.1109/FDTC.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/FuhrJLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFNPRV12, author = {Anne Canteaut and Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FuhrGRV11, author = {Thomas Fuhr and Henri Gilbert and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, editor = {Ali Miri and Serge Vaudenay}, title = {Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {230--242}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_14}, doi = {10.1007/978-3-642-28496-0\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FuhrGRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Fuhr10, author = {Thomas Fuhr}, editor = {Masayuki Abe}, title = {Finding Second Preimages of Short Messages for Hamsi-256}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {20--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_2}, doi = {10.1007/978-3-642-17373-8\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Fuhr10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrGRV10, author = {Thomas Fuhr and Henri Gilbert and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2010}, url = {http://eprint.iacr.org/2010/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuhrP09, author = {Thomas Fuhr and Thomas Peyrin}, editor = {Orr Dunkelman}, title = {Cryptanalysis of RadioGat{\'{u}}n}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {122--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_8}, doi = {10.1007/978-3-642-03317-9\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/FuhrP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09, author = {Emmanuel Bresson and Anne Canteaut and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean{-}Fran{\c{c}}ois Misarsky and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Thomas Pornin and Jean{-}Ren{\'{e}} Reinhard and C{\'{e}}line Thuillet and Marion Videau}, title = {Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2009}, url = {http://eprint.iacr.org/2009/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrP08, author = {Thomas Fuhr and Thomas Peyrin}, title = {Cryptanalysis of RadioGatun}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2008}, url = {http://eprint.iacr.org/2008/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FuhrP07, author = {Thomas Fuhr and Pascal Paillier}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Decryptable Searchable Encryption}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {228--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_17}, doi = {10.1007/978-3-540-75670-5\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FuhrP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.